Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy

Gaining comprehensive visibility of all OT/ICS assets linked to critical infrastructure environments, encompassing both physical and virtual connections, is crucial for safeguarding systems from advanced cyber threats.

Watch an insightful discussion on asset identification, attack surface enumeration, and configuration management of OT/ICS devices through the lens of a new, groundbreaking research report from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program.

We explore:

  • CECA’s role in revolutionizing cybersecurity research to protect OT/ICS assets.

  • Notable challenges for securing critical infrastructure environments.

  • The evolution of OT/ICS security, where it stands now, and where it needs to go.

  • CECA’s evaluation criteria and key results for testing the runZero platform.

Meet Our Speakers

HD Moore

Founder & CEO

Rob King

Director of Security Research

Nik Urlaub

Senior Researcher - Cyber Security & Resilience

Nick Blair

Energy and Resilience Researcher

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Webcasts
runZero Hour, Ep. 13: Anniversary episode reflecting on 2024 through the lens of IT-OT/IoT convergence
In this special anniversary episode we gathered an all-star panel of cybersecurity experts to look back on 2024 through the lens of IT-OT/IoT...
Webcasts
runZero Hour, Ep. 12: A deep-dive into OT devices, protocols, and vulnerabilities
In this month’s episode of runZero Hour, we take a deep dive into new research insights on OT devices, protocols, and vulnerabilities.
Webcasts
Dangerous Dark Matter: Confronting the Creepy Unknowns in Your Network
We explore the hidden threats and “network dark matter” lurking within your environment, viewed through the lens of zero-day vulnerabilities.
Webcasts
runZero Hour, Ep. 11: A CISA insider's perspective on managing the KEV catalog
Tod Beardsley, CISA cybersecurity expert offers an insider’s look into CISA’s mission and management of the Known Exploited Vulnerabilities (KEV)...

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2024 runZero, Inc. All Rights Reserved